Cryptography 2 Flashcards

(28 cards)

1
Q

___ ___ is the technique of obfuscating or coding data, ensuring that only the person
who is meant to see the information–and has the key to break the code–can read it.

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Origins of cryptography

A
  • Ancient Egypt
  • Caesar Cipher
  • Enigma Machine
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Keeping data secret from unauthorized parties

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ensuring data has not been tampered with

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Verifying the identity of users and systems

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ONE Key - encrypts and decrypts

A

Symmetric Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Public keya nd private key

A

Asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

one way function- cannot be reversed

A

cryptographic hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SYMM VS ASYMM

Number of keys

A

SYMM 1
shared key

ASYMM
2 keys public and priv

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SYMM VS ASYMM

Speed

A

SYMM
Very fast

ASYMM
Slow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SYMM VS ASYMM

Key size

A

SYMM 1
125-256

ASYMM
2048-4096

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SYMM VS ASYMM

Key Distribution

A

SYMM 1
Difficult - must share secretly

ASYMM
Easy - public key is open

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SYMM VS ASYMM

Best For

A

SYMM 1
Bulk data, storage, VPN

ASYMM
Key exchange, signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SYMM VS ASYMM

Examples

A

SYMM 1
AES, ChaCHa20

ASYMM
RSA, ECC, Diffle-Hellman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

order in hybrid approach

A

Handshake»_space; Session Key»_space; Bulk Transfer»_space; Done

(EXAMPLE OF HYBRID HTTPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

__ is the framework of policies, procedures, and technologies that manage digital certificates and
public-key encryption

A

Public Key Infrastructure

17
Q

A trusted organization that issues and signs digital certificates. Acts as the ‘trusted third party’ that vouches for identities

A

Certificate AUthority

18
Q

An electronic document binding a public key to an identity. Contains name, public key, validity dates, and CA signature

A

Digital Certificate

19
Q

Certificates form a chain of trust from Root CA → Intermediate CA → End Entity. Each level signs the one below it.

A

Certificate Chain

20
Q

Gold standard cipher. Used for bulk data, classified communications, and
TOP SECRET material

21
Q

Asymmetric algorithms for secure key establishment and digital
signatures in classified systems

22
Q

Hash function used for data integrity and as part of digital signature
schemes

A

Secure Hash Algorithm

23
Q

__ key agreement for establishing shared secrets over
untrusted networks

A

Diffle-hellman

24
Q

The technique of obfuscating or coding data, ensuring that only the
intended recipient — who has the key — can read the information.

25
converts plaintext into unreadable ciphertext
Encryption
26
Reverses the process using a secret key
Decryption
27
Traced back to egyptian heiroglyphics
Ancient Origins
28
Four pillars of cryptographic security
- confidentiality - integrity - authentication - non-repudiation